CN116684247A - Multi-management domain network verification method and system - Google Patents

Multi-management domain network verification method and system Download PDF

Info

Publication number
CN116684247A
CN116684247A CN202310710233.XA CN202310710233A CN116684247A CN 116684247 A CN116684247 A CN 116684247A CN 202310710233 A CN202310710233 A CN 202310710233A CN 116684247 A CN116684247 A CN 116684247A
Authority
CN
China
Prior art keywords
router
data plane
router node
domain network
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310710233.XA
Other languages
Chinese (zh)
Inventor
向乔
秦秋月
徐惠三
方星
舒继武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen University
Original Assignee
Xiamen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen University filed Critical Xiamen University
Priority to CN202310710233.XA priority Critical patent/CN116684247A/en
Publication of CN116684247A publication Critical patent/CN116684247A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present disclosure provides a multi-domain network authentication method, comprising: converting the router configuration file of each application server into an input format determined by a secure multiparty computing protocol to ensure compatibility among the application servers; performing simulation processing on the router configuration file meeting the input format so as to enable the multi-management-domain network to generate a secret data plane after convergence; and performing data plane verification on the secret data plane to obtain verification results on the various attributes of the multi-administrative domain network. The present disclosure also provides a multi-domain network authentication system.

Description

多管理域网络验证方法及系统Multi-management domain network verification method and system

技术领域technical field

本公开涉及网络安全技术领域,特别涉及一种多管理域网络验证方法及系统。The present disclosure relates to the technical field of network security, in particular to a multi-management domain network verification method and system.

背景技术Background technique

网络验证是一种自动化网络故障检测技术,它通过检查网络设备的数据平面(即路由表、访问控制表和流表等报文转发规则表)和控制平面(即设备配置文件)判断网络行为是否符合网络正确性要求,例如路由无环、路由无黑洞和可达性等。图1为相关技术的数据平面网络验证示例图,参通过检查路由器A和路由器B的转发信息库,数据平面验证系统可以判断出网络中目的IP地址为10.0.0.0的报文将在A和B之间陷入路由回路,而目的IP地址为10.0.0.1的将被B丢弃,从而进入黑洞,二者均无法正常送达目的主机Host 2,进而导致网络故障。图2为相关技术的控制平面网络验证的示例图,路由器A和路由器B之间通过边界网络协议BGP连接,控制平面验证系统通过检查B的配置文件可以判断出B不会通往目的IP前缀10.0.0.0/31的BGP路由宣告给A,以致A无法将任何目的IP地址属于10.0.0.0/31的报文送达目的主机Host 2,进而导致网络故障。Network verification is an automatic network fault detection technology. It judges whether the network behavior is correct or not by checking the data plane of the network device (that is, the routing table, access control table, flow table and other packet forwarding rule tables) and the control plane (that is, the device configuration file). Meet network correctness requirements, such as routing without loops, routing without black holes, reachability, etc. Figure 1 is an example diagram of data plane network verification in related technologies. By checking the forwarding information databases of router A and router B, the data plane verification system can determine that a packet with a destination IP address of 10.0.0.0 in the network will be forwarded between A and B. 0.1 will be discarded by B, thus entering a black hole, and neither of them can be delivered to the destination host Host 2 normally, resulting in network failure. Figure 2 is an example diagram of the control plane network verification of the related technology. Router A and router B are connected through the border network protocol BGP. The control plane verification system can judge that B will not lead to the destination IP prefix 10.0 by checking the configuration file of B. The BGP route of .0.0/31 is advertised to A, so that A cannot deliver any packet with a destination IP address of 10.0.0.0/31 to the destination host Host 2, which causes a network failure.

相关技术中的网络故障诊断工具主要分为以下三类:第一类研究通过构建与实际网络相同的仿真环境对配置文件进行仿真,然后使用数据平面验证工具检查仿真得到的数据平面,以达到检测配置文件正确性的目的;第二类研究通过将网络配置与网络拓扑融合,构建特殊的抽象图模型,并通过在抽象图上寻找满足特定条件的路径来验证配置文件是否满足网络正确性;第三类研究使用形式化方法,利用数据逻辑对网络设备的配置文件与需要检查的正确性要求进行逻辑建模,并通过检查所构建的逻辑模型的可满足性,判断相应网络配置是否满足相应的正确性。The network fault diagnosis tools in related technologies are mainly divided into the following three categories: the first type of research simulates the configuration file by constructing the same simulation environment as the actual network, and then uses the data plane verification tool to check the simulated data plane to achieve detection The purpose of the correctness of the configuration file; the second type of research builds a special abstract graph model by fusing the network configuration with the network topology, and verifies whether the configuration file satisfies the correctness of the network by looking for a path that satisfies specific conditions on the abstract graph; The three types of research use formal methods, use data logic to logically model the configuration files of network equipment and the correctness requirements that need to be checked, and judge whether the corresponding network configuration meets the corresponding requirements by checking the satisfiability of the logical model constructed. correctness.

但是,第一类研究的局限性在于有效性,不能应对网络延迟等各种真实场景所产生的问题;第二类研究的局限性在于有效性和使用范围,该类验证工具无法验证许多常见的网络协议配置。第三类研究的局限性在于规模性较差,对于一些简单的网络配置进行网络可达性验证时,还需要较长的验证时间。另外,无论是数据平面还是控制平面,相关技术中的网络验证工具服务的主要对象都是单管理域网络,对于多管理域网络故障的排查还主要依赖于不同管理域的网络管理员之间的沟通,这样的验证方式效率较低。However, the limitation of the first type of research lies in its effectiveness, and it cannot deal with problems arising from various real scenarios such as network delays; the limitation of the second type of research lies in its effectiveness and scope of use. Network protocol configuration. The limitation of the third type of research is that the scale is poor, and it takes a long time to verify the network reachability for some simple network configurations. In addition, whether it is the data plane or the control plane, the main object of the network verification tool service in the related art is a single management domain network, and the troubleshooting of multi-management domain network faults mainly depends on the network administrators of different management domains. Communication, such a verification method is inefficient.

发明内容Contents of the invention

为了解决上述的至少一个问题,本公开提供了一种多管理域网络验证方法及系统。In order to solve at least one of the above problems, the present disclosure provides a multi-management domain network verification method and system.

根据本公开的一个方面提出了这样一种多管理域网络验证方法,包括:将各个应用服务器的路由器配置文件转化为安全多方计算协议确定的输入格式,以保证各个所述应用服务器之间的兼容性;对满足所述输入格式的所述路由器配置文件进行模拟处理,以使得多管理域网络在收敛后生成秘密数据平面;以及对所述秘密数据平面进行数据平面验证,以获得关于所述多管理域网络的各个属性的验证结果。According to one aspect of the present disclosure, such a multi-management domain network verification method is proposed, including: converting the router configuration files of each application server into an input format determined by a secure multi-party computing protocol, so as to ensure compatibility among the application servers performance; perform simulation processing on the router configuration file satisfying the input format, so that the multi-management domain network generates a secret data plane after convergence; and perform data plane verification on the secret data plane to obtain information about the multi-management domain network Validation results for various attributes of the administrative domain network.

在一些实施方式中,所述将各个应用服务器的路由器配置文件转化为安全多方计算协议确定的输入格式,包括:将各个所述应用服务器的路由器配置文件转化为相同的中间表示;将所述中间表示转化为所述安全多方计算协议确定的输入格式。In some embodiments, the converting the router configuration files of each application server into the input format determined by the secure multi-party computing protocol includes: converting the router configuration files of each of the application servers into the same intermediate representation; converting the intermediate Represents conversion to the input format determined by the secure multi-party computation protocol.

在一些实施方式中,所述安全多方计算协议确定的输入格式包括:域间路由信息表、所述应用服务器的路由器配置信息、所述应用服务器的路由器节点更新状态和路由信息更新列表,其中所述域间路由信息表至少用于存储有路线数据,其中所述路线数据至少包括路由宣告的前缀、下一路由器节点的网络协议地址、所经过的其余路由器节点、当前的所述路由器节点的本地优先级、变更路由器信息;以及所述应用服务器的路由器配置信息用于表征当前的所述路由器节点与相邻路由器节点之间的关系,其中所述路由器配置信息至少包括所述相邻路由器节点的网络协议地址、当前的所述路由器节点的应用服务器编号、所述相邻路由器节点的应用服务器编号、当前的所述路由器节点对应的接口网络协议地址、当前的所述路由器节点对应的输入输出策略。In some embodiments, the input format determined by the secure multi-party computing protocol includes: an inter-domain routing information table, router configuration information of the application server, update status of router nodes of the application server, and a routing information update list, wherein The inter-domain routing information table is at least used to store route data, wherein the route data at least includes the prefix of the route announcement, the network protocol address of the next router node, the remaining router nodes passed by, and the local address of the current router node. priority, change router information; and the router configuration information of the application server is used to characterize the current relationship between the router node and the adjacent router node, wherein the router configuration information includes at least the Network protocol address, the current application server number of the router node, the application server number of the adjacent router node, the current interface network protocol address corresponding to the router node, and the current input and output strategy corresponding to the router node .

在一些实施方式中,所述对满足所述输入格式的所述路由器配置文件进行模拟处理,以使得多管理域网络在收敛后生成秘密数据平面,包括:对各个所述应用服务器中路由器节点的域间路由信息表进行初始化,使得各个所述域间路由信息表中仅存储有原始路由器节点;响应于任一所述域间路由信息表的更新信息,对所述更新信息对应的所述路由器节点的对等路由器节点发送路由通知;以及控制各个所述路由器节点执行相应的所述路由通告,直至所述多管理域网络收敛并生成所述秘密数据平面。In some implementation manners, the simulating process on the router configuration file satisfying the input format, so that the multi-management domain network generates a secret data plane after convergence, includes: The inter-domain routing information table is initialized so that only original router nodes are stored in each of the inter-domain routing information tables; in response to update information of any of the inter-domain routing information tables, the router corresponding to the update information The node's peer router node sends routing notifications; and controls each of the router nodes to execute corresponding routing notifications until the multi-administrative domain network converges and generates the secret data plane.

在一些实施方式中,所述响应于任一所述域间路由信息表的更新信息,对所述更新信息对应的所述路由器节点的对等路由器节点发送路由通知,至少包括:利用出口路线函数对所述路由器节点的导出过滤器的动作进行建模,以将所述更新信息转换为出口数据;以及利用入口路线函数对所述对等路由器节点上的导入过滤器进行建模,并修改所述出口数据。In some implementation manners, the sending a route notification to the peer router node of the router node corresponding to the update information in response to any update information of the inter-domain routing information table includes at least: using an egress route function modeling the action of an export filter of the router node to convert the updated information into egress data; and modeling an import filter on the peer router node using an ingress route function and modifying the export data.

在一些实施方式中,所述对所述秘密数据平面进行数据平面验证,以获得关于所述多管理域网络的各个属性的验证结果,包括:控制目的路由器节点执行数据无关搜索操作,判断所述目的路由器节点对应的有效路径中是否存在到达入口路由器节点的路径;以及响应于存在到达所述入口路由器节点的路径,确定所述入口路由器节点至所述目的路由器节点满足可达性,以获得关于所述多管理域网络的可达性属性的验证结果。In some implementation manners, the performing data plane verification on the secret data plane to obtain the verification result on each attribute of the multi-administrative domain network includes: controlling the destination router node to perform a data-independent search operation, and judging the Whether there is a path to the ingress router node in the effective path corresponding to the destination router node; and in response to the presence of a path to the ingress router node, determine that the ingress router node to the destination router node satisfies reachability, so as to obtain information about A verification result of the reachability attribute of the multi-administrative domain network.

在一些实施方式中,还包括:在对所述秘密数据平面进行数据平面验证时,将各个所述应用服务器的私有值进行加密,以防止所述私有值被读取。In some embodiments, the method further includes: when performing data plane verification on the secret data plane, encrypting the private value of each application server to prevent the private value from being read.

在一些实施方式中,在所述对所述秘密数据平面进行数据平面验证,以获得关于所述多管理域网络的各个属性的验证结果之后,包括:将所述验证结果同步至各个所述应用服务器,以使得各个所述应用服务器获得所述多管理域网络所满足的属性。In some embodiments, after the data plane verification is performed on the secret data plane to obtain the verification results about the attributes of the multi-management domain network, it includes: synchronizing the verification results to each of the applications server, so that each of the application servers obtains the attributes satisfied by the multi-management domain network.

在一些实施方式中,在所述将各个应用服务器的路由器配置文件转化为安全多方计算协议确定的输入格式,以保证各个所述应用服务器之间的兼容性之前,包括:将各个所述应用服务器的路由器节点与代理服务器进行连接和认证,并将各个所述路由器节点的路由器配置信息发送至所述代理服务器。In some embodiments, before converting the router configuration file of each application server into the input format determined by the secure multi-party computing protocol to ensure the compatibility between each of the application servers, it includes: converting each of the application servers The router nodes are connected and authenticated with the proxy server, and the router configuration information of each router node is sent to the proxy server.

根据本公开的另一个方面提供了这样一种多管理域网络验证系统,包括:配置解析模块,用于将各个应用服务器的路由器配置文件转化为安全多方计算协议确定的输入格式,以保证各个所述应用服务器之间的兼容性;路由协议模拟模块,用于对满足所述输入格式的所述路由器配置文件进行模拟处理,以使得多管理域网络在收敛后生成秘密数据平面;以及数据平面验证模块,用于对所述秘密数据平面进行数据平面验证,以获得关于所述多管理域网络的各个属性的验证结果。According to another aspect of the present disclosure, such a multi-management domain network verification system is provided, including: a configuration parsing module for converting the router configuration files of each application server into an input format determined by a secure multi-party computing protocol, so as to ensure that each Compatibility between the application servers; a routing protocol simulation module, used to simulate the router configuration file satisfying the input format, so that the multi-management domain network generates a secret data plane after convergence; and data plane verification A module, configured to perform data plane verification on the secret data plane, so as to obtain verification results on various attributes of the multi-management domain network.

附图说明Description of drawings

附图示出了本公开的示例性实施方式,并与其说明一起用于解释本公开的原理,其中包括了这些附图以提供对本公开的进一步理解,并且附图包括在本说明书中并构成本说明书的一部分。The accompanying drawings illustrate exemplary embodiments of the present disclosure and, together with the description, serve to explain the principles of the disclosure, are included to provide a further understanding of the disclosure, and are incorporated in and constitute this specification. part of the manual.

图1为相关技术的数据平面网络验证示例图。FIG. 1 is an example diagram of data plane network verification in the related art.

图2为相关技术的控制平面网络验证的示例图。FIG. 2 is an example diagram of network verification of a control plane in the related art.

图3为本公开示例性实施方式的多管理域网络验证方法框图。Fig. 3 is a block diagram of a multi-management domain network verification method according to an exemplary embodiment of the present disclosure.

图4为本公开示例性实施方式的多管理域网络验证系统示意图。Fig. 4 is a schematic diagram of a multi-management domain network verification system according to an exemplary embodiment of the present disclosure.

图5为本公开示例性实施方式的InCV云服务器架构示意图。FIG. 5 is a schematic diagram of an InCV cloud server architecture according to an exemplary embodiment of the present disclosure.

图6为本公开示例性实施方式的配置文件厂商中立化示意图。FIG. 6 is a schematic diagram of configuration file vendor neutralization in an exemplary embodiment of the present disclosure.

图7至14依次为本公开示例性实施方式的DO-Simulation算法1至8的代码示意图。7 to 14 are sequentially schematic diagrams of codes of DO-Simulation algorithms 1 to 8 in an exemplary embodiment of the present disclosure.

图15为本公开示例性实施方式的数据无关算法的代码示意图。Fig. 15 is a code schematic diagram of a data-independent algorithm according to an exemplary embodiment of the present disclosure.

图16为本公开示例性实施方式的不同规模网络的时间开销对比图。Fig. 16 is a comparison diagram of time overheads of networks of different scales according to an exemplary embodiment of the present disclosure.

图17为本公开示例性实施方式的不同规模网络的通信轮次与全局数量对比图。Fig. 17 is a comparison diagram of communication rounds and global numbers of networks of different scales according to an exemplary embodiment of the present disclosure.

图18为本公开示例性实施方式的InCV与未采用FASTPLANE优化版本的对比图。FIG. 18 is a graph comparing InCV of an exemplary embodiment of the present disclosure with a non-FASTPLANE optimized version.

具体实施方式Detailed ways

下面结合附图和实施方式对本公开作进一步的详细说明。可以理解的是,此处所描述的具体实施方式仅用于解释相关内容,而非对本公开的限定。另外还需要说明的是,为了便于描述,附图中仅示出了与本公开相关的部分。The present disclosure will be further described in detail below with reference to the drawings and embodiments. It can be understood that the specific implementation manners described here are only used to explain relevant content, rather than to limit the present disclosure. It should also be noted that, for ease of description, only parts related to the present disclosure are shown in the drawings.

需要说明的是,在不冲突的情况下,本公开中的实施方式及实施方式中的特征可以相互组合。下面将参考附图并结合实施方式来详细说明本公开的技术方案。It should be noted that, in the case of no conflict, the implementation modes and the features in the implementation modes in the present disclosure can be combined with each other. The technical solutions of the present disclosure will be described in detail below with reference to the accompanying drawings and in combination with implementation manners.

除非另有说明,否则示出的示例性实施方式/实施例将被理解为提供可以在实践中实施本公开的技术构思的一些方式的各种细节的示例性特征。因此,除非另有说明,否则在不脱离本公开的技术构思的情况下,各种实施方式/实施例的特征可以另外地组合、分离、互换和/或重新布置。Unless otherwise specified, the illustrated exemplary embodiments/embodiments are to be understood as exemplary features providing various details of some manner in which the technical idea of the present disclosure can be implemented in practice. Therefore, unless otherwise stated, the features of various embodiments/embodiments may be additionally combined, separated, interchanged, and/or rearranged without departing from the technical concept of the present disclosure.

本文使用的术语是为了描述具体实施例的目的,而不是限制性的。如这里所使用的,除非上下文另外清楚地指出,否则单数形式“一个(种、者)”和“所述(该)”也意图包括复数形式。此外,当在本说明书中使用术语“包含”和/或“包括”以及它们的变型时,说明存在所陈述的特征、整体、步骤、操作、部件、组件和/或它们的组,但不排除存在或附加一个或更多个其它特征、整体、步骤、操作、部件、组件和/或它们的组。还要注意的是,如这里使用的,术语“基本上”、“大约”和其它类似的术语被用作近似术语而不用作程度术语,如此,它们被用来解释本领域普通技术人员将认识到的测量值、计算值和/或提供的值的固有偏差。The terminology used herein is for the purpose of describing particular embodiments and is not of limitation. As used herein, the singular forms "a" and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. In addition, when the terms "comprising" and/or "comprising" and their variants are used in this specification, it means that the stated features, integers, steps, operations, parts, components and/or their groups exist, but do not exclude One or more other features, integers, steps, operations, parts, components and/or groups thereof are present or in addition. Note also that, as used herein, the terms "substantially," "about," and other similar terms are used as terms of approximation and not as terms of degree, and as such, they are used to explain what one of ordinary skill in the art would recognize. Inherent deviations from measured, calculated and/or supplied values.

图3为本公开示例性实施方式的多管理域网络验证方法框图。下面结合图3对多管理域网络验证方法S100的各个步骤进行详细说明。Fig. 3 is a block diagram of a multi-management domain network verification method according to an exemplary embodiment of the present disclosure. Each step of the multi-management domain network verification method S100 will be described in detail below with reference to FIG. 3 .

如图3所示,根据本公开的一个方面提出了这样一种多管理域网络验证方法S100,包括:As shown in FIG. 3, according to one aspect of the present disclosure, such a multi-management domain network verification method S100 is proposed, including:

步骤S102,将各个应用服务器的路由器配置文件转化为安全多方计算协议确定的输入格式,以保证各个应用服务器之间的兼容性。Step S102, converting the router configuration files of each application server into the input format determined by the secure multi-party computing protocol, so as to ensure the compatibility between each application server.

步骤S104,对满足输入格式的路由器配置文件进行模拟处理,以使得多管理域网络在收敛后生成秘密数据平面。Step S104, performing simulation processing on the router configuration file satisfying the input format, so that the multi-management domain network generates a secret data plane after convergence.

步骤S106,对秘密数据平面进行数据平面验证,以获得关于多管理域网络的各个属性的验证结果。Step S106, performing data plane verification on the secret data plane to obtain verification results about various attributes of the multi-management domain network.

路由器配置文件用于表征应用服务器中路由节点的配置信息。安全多方计算(Secure Muti-party Computation,SMPC)协议以密码学算法保证了在数据平面验证的过程中的数据安全性,以避免数据的泄露和伪造。The router configuration file is used to represent the configuration information of the routing node in the application server. The Secure Multi-party Computation (SMPC) protocol uses cryptographic algorithms to ensure data security in the process of data plane verification to avoid data leakage and forgery.

在一些实施方式中,步骤S102的具体实施方式包括:将各个应用服务器的路由器配置文件转化为相同的中间表示;将中间表示转化为安全多方计算协议确定的输入格式。In some implementations, the specific implementation of step S102 includes: converting the router configuration files of each application server into the same intermediate representation; converting the intermediate representation into an input format determined by the secure multi-party computing protocol.

在一些实施方式中,安全多方计算协议确定的输入格式包括:域间路由信息表(Routing Information Base,RIB)、应用服务器的路由器配置信息Config、应用服务器的路由器节点更新状态HasUpdate和路由信息更新列表UpdateList,其中域间路由信息表至少用于存储有路线数据Route,其中路线数据至少包括路由宣告的前缀Prefix、下一路由器节点的网络协议地址NextHop、所经过的其余路由器节点AsPath、当前的路由器节点的本地优先级LocalPref、变更路由器信息IDs;以及应用服务器的路由器配置信息用于表征当前的路由器节点与相邻路由器节点之间的关系,其中路由器配置信息至少包括相邻路由器节点的网络协议地址PeerAddress、当前的路由器节点的应用服务器编号LocalAs、相邻路由器节点的应用服务器编号RemoteAs、当前的路由器节点对应的接口网络协议地址Interface、当前的路由器节点对应的输入输出策略Policy。In some embodiments, the input format determined by the secure multi-party computing protocol includes: inter-domain routing information table (Routing Information Base, RIB), router configuration information Config of the application server, router node update status HasUpdate of the application server, and routing information update list UpdateList, wherein the inter-domain routing information table is at least used to store route data Route, wherein the route data at least includes the prefix Prefix announced by the route, the network protocol address NextHop of the next router node, the remaining router nodes AsPath passed through, and the current router node The local priority LocalPref, change router information IDs; and the router configuration information of the application server are used to represent the relationship between the current router node and the adjacent router node, wherein the router configuration information includes at least the network protocol address PeerAddress of the adjacent router node , the application server number LocalAs of the current router node, the application server number RemoteAs of the adjacent router node, the interface network protocol address Interface corresponding to the current router node, and the input and output policy Policy corresponding to the current router node.

其中,当前的路由器节点对应的输入输出策略Policy至少包括输入策略ImportPolicy和输出策略ExportPolicy。Wherein, the input and output policy Policy corresponding to the current router node includes at least an import policy ImportPolicy and an output policy ExportPolicy.

在一些实施方式中,步骤S104的具体执行步骤包括:对各个应用服务器中路由器节点的域间路由信息表进行初始化,使得各个域间路由信息表中仅存储有原始路由器节点;响应于任一域间路由信息表的更新信息,对更新信息对应的路由器节点的对等路由器节点发送路由通知;以及控制各个路由器节点执行相应的路由通告,直至多管理域网络收敛并生成秘密数据平面。In some embodiments, the specific execution steps of step S104 include: initializing the inter-domain routing information table of the router node in each application server, so that only the original router node is stored in each inter-domain routing information table; The updated information of the inter-routing information table sends routing notifications to the peer router nodes of the router nodes corresponding to the updated information; and controls each router node to perform corresponding routing notifications until the multi-management domain network converges and generates a secret data plane.

在一些实施方式中,响应于任一域间路由信息表的更新信息,对更新信息对应的路由器节点的对等路由器节点发送路由通知,至少包括:利用出口路线函数对路由器节点的导出过滤器的动作进行建模,以将更新信息转换为出口数据;以及利用入口路线函数对对等路由器节点上的导入过滤器进行建模,并修改所述出口数据。In some embodiments, in response to the update information of any inter-domain routing information table, sending a route notification to the peer router node of the router node corresponding to the update information at least includes: using the export route function to export the filter of the router node An action is modeled to convert update information into egress data; and an ingress route function is used to model an ingress filter on a peer router node and modify the egress data.

在一些实施方式中,步骤S106的具体执行步骤为:控制目的路由器节点执行数据无关搜索操作,判断目的路由器节点对应的有效路径中是否存在到达入口路由器节点的路径;以及响应于存在到达入口路由器节点的路径,确定入口路由器节点至目的路由器节点满足可达性,以获得关于多管理域网络的可达性属性的验证结果。In some embodiments, the specific execution steps of step S106 are: controlling the destination router node to perform a data-independent search operation, determining whether there is a path to the ingress router node among the effective paths corresponding to the destination router node; The path from the ingress router node to the destination router node is determined to be reachable, so as to obtain the verification result of the reachability attribute of the multi-administrative domain network.

在一些实施方式中,多管理域网络验证方法S100还包括:在对秘密数据平面进行数据平面验证时,将各个应用服务器的私有值进行加密,以防止私有值被读取。In some implementations, the multi-management domain network verification method S100 further includes: when performing data plane verification on the secret data plane, encrypting the private value of each application server to prevent the private value from being read.

在一些实施方式中,在步骤S106之后,包括:将验证结果同步至各个应用服务器,以使得各个应用服务器获得多管理域网络所满足的属性。In some implementations, after step S106, it includes: synchronizing the verification result to each application server, so that each application server obtains the attributes satisfied by the multi-management domain network.

在一些实施方式中,在步骤S02之前,包括:将各个应用服务器的路由器节点与代理服务器进行连接和认证,并将各个路由器节点的路由器配置信息发送至代理服务器。In some implementation manners, before step S02, it includes: connecting and authenticating the router nodes of each application server with the proxy server, and sending the router configuration information of each router node to the proxy server.

图4为本公开示例性实施方式的多管理域网络验证系统示意图。Fig. 4 is a schematic diagram of a multi-management domain network verification system according to an exemplary embodiment of the present disclosure.

参考图4,本公开的系统可以分为三个串联的模块:配置解析模块、隐私保护下的路由协议模拟模块和隐私保护下的数据平面验证模块。Referring to FIG. 4 , the disclosed system can be divided into three modules connected in series: a configuration analysis module, a routing protocol simulation module under privacy protection, and a data plane verification module under privacy protection.

具体地,配置解析模块用于将各个应用服务器的路由器配置文件转化为安全多方计算协议确定的输入格式(即统一格式的SMPC输入),以保证各个应用服务器之间的兼容性。路由协议模拟模块用于对满足输入格式的路由器配置文件进行模拟处理,以使得多管理域网络在收敛后生成秘密数据平面(即隐私的数据平面RIB)。数据平面验证模块用于对秘密数据平面进行数据平面验证,以获得关于多管理域网络的各个属性的验证结果。Specifically, the configuration parsing module is used to convert the router configuration files of each application server into the input format determined by the secure multi-party computing protocol (that is, the SMPC input in a unified format), so as to ensure the compatibility between each application server. The routing protocol simulation module is used for simulating the router configuration file satisfying the input format, so that the multi-administrative domain network generates a secret data plane (that is, a private data plane RIB) after convergence. The data plane verification module is used to perform data plane verification on the secret data plane, so as to obtain verification results about various attributes of the multi-management domain network.

在一些实施方式中,数据平面验证模块还会将验证结果以公开的方式返回给所有的参与方,即各个应用服务器。例如AS(Application Server,应用服务器)1、AS2和AS3,各个AS的厂商在此不做限制。In some implementations, the data plane verification module also returns the verification results to all participants, that is, each application server, in a public manner. For example, AS (Application Server, application server) 1, AS2, and AS3, manufacturers of each AS are not limited here.

具体地,配置解析模块首先负责eBGP(external Border Gateway Protocol,外部边界网关协议)路由器与代理服务器的连接与认证。在完成认证后,每个AS的eBGP路由器可将配置发送至代理服务器,或进行配置的更改。进一步地,配置解析模块将各个应用服务器的路由器配置文件转化为SMPC协议确定的输入格式,以解决不同应用服务器之间的兼容性问题。Specifically, the configuration parsing module is firstly responsible for the connection and authentication between the eBGP (external Border Gateway Protocol, external Border Gateway Protocol) router and the proxy server. After completing the authentication, the eBGP router of each AS can send the configuration to the proxy server, or make configuration changes. Further, the configuration parsing module converts the router configuration files of each application server into the input format determined by the SMPC protocol, so as to solve the compatibility problem between different application servers.

隐私保护下的路由协议模拟模块(DO-Simulation)经过转换的输入数据由快速多管理域网络验证InCV的模拟算法DO-Simulation进行处理。DO-Simulation算法模拟了BGP(Border Gateway Protocol,边界网络协议)中的路由通告。然而,在执行DO-Simulation算法期间,参与计算的任何一方(或代理路由器)都不会泄露私有信息。运行DO-Simulation处理之后,网络在收敛后会生成一个秘密数据平面RIBs,这是下一步DO-DPV(DO-Data PlaneValidation,数据源平面验证)的基础。The converted input data of the routing protocol simulation module (DO-Simulation) under privacy protection is processed by the simulation algorithm DO-Simulation of InCV for fast multi-management domain network verification. The DO-Simulation algorithm simulates the route advertisement in BGP (Border Gateway Protocol, border network protocol). However, during the execution of the DO-Simulation algorithm, none of the parties involved in the calculation (or proxy routers) will disclose private information. After running the DO-Simulation process, the network will generate a secret data plane RIBs after convergence, which is the basis for the next step DO-DPV (DO-Data Plane Validation, data source plane verification).

隐私保护下的数据平面验证模块(DO-DPV)根据操作员的规范,DO-DPV对不同属性进行验证。对于给定的秘密数据平面,它还保证了所有验证功能的数据无关性。DO-DPV的最终验证结果会公开给所有参与方,以指示在给定配置下,网络中是否满足某些属性Data Plane Verification Module under Privacy Preservation (DO-DPV) According to the operator's specification, DO-DPV verifies different attributes. It also guarantees data independence for all verification functions for a given secret data plane. The final verification results of DO-DPV are disclosed to all participating parties to indicate whether certain properties are satisfied in the network under a given configuration

快速多管理域网络验证InCV是一个基于云的验证系统,旨在实现网络操作员之间的协作,以确定他们的自治系统(Autonomous System,ASes)和路由器配置是否满足特定属性。通过在计算过程中确保每个AS的配置信息保密,InCV可以防止配置信息在参与者之间泄露。Rapid Multi-Administrative Domain Network Validation InCV is a cloud-based validation system designed to enable collaboration among network operators to determine whether their Autonomous Systems (ASes) and router configurations meet specific properties. By keeping the configuration information of each AS secret during computation, InCV prevents configuration information from being leaked among participants.

为了更好地说明设计,我们假设每个AS都表现为单个eBGP路由器,通过忽略AS内部的拓扑结构来降低拓扑复杂性。我们认为这个假设是合理的,因为跨域验证主要关注AS之间使用的配置正确性。To better illustrate the design, we assume that each AS behaves as a single eBGP router, reducing the topology complexity by ignoring the topology inside the AS. We think this assumption is reasonable, since cross-domain verification mainly focuses on the correctness of the configuration used between ASs.

图5为本公开示例性实施方式的InCV云服务器架构示意图。FIG. 5 is a schematic diagram of an InCV cloud server architecture according to an exemplary embodiment of the present disclosure.

参考图5,InCV中的每个参与验证的eBGP路由器(例如P0、P1、P3、P4)在云端都会被分配自己的代理服务器,负责执行隐私配置转化并进行安全计算。在计算过程中,每个代理首先将配置转换为SMPC协议的兼容输入,然后与其他代理通信以安全地协同计算输出。由于InCV计算规模庞大,需要数万轮通信和数百GB(千兆字节)的数据流,这种设计是必要的。数据平面之间的信息交互是隐私的,而验证结果则是公开的;网络拓扑也是公开的,可在任一时刻被访问;用户命令也是公开的。Referring to Figure 5, each participating eBGP router in InCV (such as P0, P1, P3, P4) will be assigned its own proxy server in the cloud, responsible for performing privacy configuration conversion and secure calculation. During computation, each agent first converts the configuration into a compatible input of the SMPC protocol, and then communicates with other agents to safely and collaboratively compute the output. This design is necessary due to the massive scale of InCV computation, which requires tens of thousands of rounds of communication and data streams of hundreds of gigabytes (gigabytes). The information exchange between data planes is private, while the verification results are public; the network topology is also public and can be accessed at any time; user commands are also public.

基于前述,InCV的云服务架构具有以下优点:更好的性能,通过利用云环境的高带宽和低延迟,InCV的性能可以得到显著提高。较高的隐私性,通过代理端的身份认证及权限控制,InCV确保各个AS的配置信息在计算过程中对其他参与者保密,从而保护了配置隐私。较强的可扩展性,由于代理服务器在云端进行计算,InCV可以轻松地扩展其计算能力以适应不断增长的网络规模。更好的全连接性,通常SMPC计算要求参与方之间的全连接,或至少两两可以互相通信,然而在现实网络中,由于复杂的路由控制,多个AS间的通信很难满足这种要求,而采用云服务架构能够高效解决这一问题。Based on the foregoing, InCV's cloud service architecture has the following advantages: Better performance. By utilizing the high bandwidth and low latency of the cloud environment, InCV's performance can be significantly improved. High privacy, through identity authentication and authority control on the agent side, InCV ensures that the configuration information of each AS is kept secret from other participants during the calculation process, thereby protecting configuration privacy. Strong scalability, since the proxy server performs calculations in the cloud, InCV can easily expand its computing power to adapt to the growing network scale. Better full connectivity, usually SMPC computing requires full connectivity between participants, or at least two can communicate with each other, but in real networks, due to complex routing control, it is difficult for communication between multiple ASs to meet this requirement. Requirements, and the use of cloud service architecture can efficiently solve this problem.

图6为本公开示例性实施方式的配置文件厂商中立化示意图。FIG. 6 is a schematic diagram of configuration file vendor neutralization in an exemplary embodiment of the present disclosure.

参考图6,在参与方eBGP路由器与云端的代理服务器交互的过程中,隐私配置转化是一个较为关键的步骤。其目的在于实现配置的厂商中立化。厂商中立(Vendorneutrality)是指一个产品、服务或系统在设计和实现时不偏向于任何特定的厂商或供应商,而能够支持所有厂商的设备输入。在域间网络中,不同AS(例如AS1、AS2和AS3)采用来自不同供应商的路由器和网络设备是非常常见的现象。主流厂商之间的配置语言各不相同,即使实现相同策略也可能会存在巨大差别。Referring to Figure 6, in the process of interaction between the eBGP router of the participating party and the proxy server in the cloud, the conversion of privacy configuration is a relatively critical step. Its purpose is to achieve vendor neutralization of the configuration. Vendor neutrality (Vendorneutrality) means that a product, service or system is not biased towards any specific manufacturer or supplier when it is designed and implemented, but can support equipment input from all manufacturers. In an inter-domain network, it is very common that different ASs (such as AS1, AS2, and AS3) use routers and network equipment from different suppliers. Configuration languages vary among major vendors, and even implementing the same strategy can vary significantly.

为应对这一挑战,我们修改了网络验证工具Batfish的源码,首先将不同厂商的路由器配置转化为相同的中间表示;再将路由器配置文件的中间表示转化为SMPC协议确定的输入格式。通过这种做法解决了不同设备之间的兼容性问题。To meet this challenge, we modified the source code of Batfish, a network verification tool. First, we converted router configurations from different vendors into the same intermediate representation; and then converted the intermediate representation of router configuration files into the input format determined by the SMPC protocol. This approach solves compatibility issues between different devices.

SMPC协议定义了算法实现过程中每个节点的数据结构,每个路由器节点的输入格式均可由域间路由信息表RIB、应用服务器的路由器配置信息Config、应用服务器的路由器节点更新状态HasUpdate和路由信息更新列表UpdateList四部分构成。其中,RIB使用数组存储,数组中的每个条目为一个Route类型的数据结构。Config代表该路由器节点的配置,HasUpdate使用布尔类型数据表示当前节点是否有更新。UpdateList使用数组存储,数组中的每个条目为更新的路由Route及其类型Type,其中Type使用short类型数据用0、1、2分别表示添加、删除、更新三种更新类型。The SMPC protocol defines the data structure of each node in the algorithm implementation process. The input format of each router node can be determined by the inter-domain routing information table RIB, the router configuration information Config of the application server, the router node update status HasUpdate of the application server, and the routing information The update list UpdateList consists of four parts. Among them, the RIB is stored in an array, and each entry in the array is a data structure of the Route type. Config represents the configuration of the router node, and HasUpdate uses Boolean data to indicate whether the current node is updated. UpdateList is stored in an array, and each entry in the array is the updated route Route and its type Type, where Type uses short type data and uses 0, 1, and 2 to represent three update types: add, delete, and update, respectively.

Route由Prefix(网络前缀)、NextHop(下一跳)、AsPath(As路径)、LocalPref(本地优先级)、Med(多出口鉴别器)和IDs(路由的ID)这几部分组成。其中,Prefix代表这条路由宣告的前缀,由ip和掩码mask构成。NextHop是一个ip地址,代表下一跳。AsPath使用数组存储,代表需要经过的路由器节点。LocalPref代表这条路由的本地优先级,IDs用于撤销和更新,用路由器名称和序号表示,序号为加入到路由表的时间顺序,保证唯一性;比如A_1。例如A中的路由l1撤销时,邻居B的路由l2对应撤销,B需要判断l2.OriginID=l1.RIBID来进行删除。Route consists of Prefix (network prefix), NextHop (next hop), AsPath (As path), LocalPref (local preference), Med (multi-exit discriminator) and IDs (routing ID). Among them, Prefix represents the prefix announced by this route, which is composed of ip and mask mask. NextHop is an ip address representing the next hop. AsPath uses array storage, which represents the router nodes that need to pass through. LocalPref represents the local priority of this route, and IDs are used for revoking and updating, represented by the router name and sequence number, and the sequence number is the time sequence added to the routing table to ensure uniqueness; for example, A_1. For example, when route l1 in A is withdrawn, route l2 of neighbor B is correspondingly withdrawn, and B needs to determine l2.OriginID=l1.RIBID to delete.

Config为每个节点的配置,其包含了每个邻居路由器的关系,包括PeerAddress、LocalAs、RemoteAs、Interface和Policy。PeerAddress表示邻居的ip地址,LocalAs表示该路由器的As号,RemoteAs表示邻居路由器的As号,Interface表示接口的网络协议IP地址。Policy包含入口策略ImportPolicy和出口策略ExportPolicy。ImportPolicy使用数组存储,其中的每个条目为一个路线图routemap,每个routemap包含若干个match语句和set语句,match语句包含Match PrefixList和Match NextHop,用于匹配前缀列表和下一跳;Set语句包含Set LocalPref和Set Metric,它们用于设置本地优先级和Metric。布尔类型的动作用于表明该策略是拒绝deny还是允许permit。Config is the configuration of each node, which contains the relationship of each neighbor router, including PeerAddress, LocalAs, RemoteAs, Interface and Policy. PeerAddress represents the ip address of the neighbor, LocalAs represents the As number of the router, RemoteAs represents the As number of the neighbor router, and Interface represents the network protocol IP address of the interface. Policy includes ingress policy ImportPolicy and egress policy ExportPolicy. ImportPolicy is stored in an array, where each entry is a routemap. Each routemap contains several match statements and set statements. The match statement contains Match PrefixList and Match NextHop, which are used to match the prefix list and next hop; the Set statement contains Set LocalPref and Set Metric, which are used to set local priority and Metric. Boolean actions are used to indicate whether the policy is deny or permit.

图7至14依次为本公开示例性实施方式的DO-Simulation算法1至8的代码示意图。7 to 14 are sequentially schematic diagrams of codes of DO-Simulation algorithms 1 to 8 in an exemplary embodiment of the present disclosure.

针对隐私保护下的路由协议模拟模块,涉及了八种DO-Simulation算法,下面将结合图7至图14对各个算法进行简要说明。For the routing protocol simulation module under privacy protection, eight DO-Simulation algorithms are involved. The following will briefly describe each algorithm with reference to Figure 7 to Figure 14 .

DO-Simulation的目标是将多个代理的隐私输入转换为数据平面,这将作为后续步骤中的属性验证的基础。The goal of DO-Simulation is to transform the private inputs of multiple agents into a data plane, which will serve as the basis for property verification in subsequent steps.

像许多其他验证算法一样,DO-Simulation是针对网络管理员指定的每个ip前缀p执行。同样,我们将宣布ip前缀p的路由器视为公共已知的,它被称为origin(初始)。路由器n接收到的路由通告存储在RIB(n)中,代表路由信息库RIB,它是存储在路由器中的一个数据表,列出了到特定网络目的地的路由,以及与这些路由相关的度量。在算法的初始化步骤,只有RIB(Origin)有一个p的条目,其他路由器的RIB被赋值为空。这是为了建模当origin刚刚发现p时的网络状态。Has_update是一个布尔数组,用于指示路由器是否有要导入的路由通告。类似地,只有has_update(p)会被赋值为True。Like many other authentication algorithms, DO-Simulation is performed for each ip prefix p specified by the network administrator. Likewise, we consider the router announcing the ip prefix p to be publicly known, which is called origin. Router advertisements received by router n are stored in RIB(n), which stands for Routing Information Base RIB, which is a data table stored in a router that lists routes to specific network destinations, and the metrics associated with those routes . In the initialization step of the algorithm, only the RIB (Origin) has an entry for p, and the RIBs of other routers are assigned empty values. This is to model the state of the network when the origin has just discovered p. Has_update is a boolean array indicating whether the router has route advertisements to import. Similarly, only has_update(p) will be assigned True.

参考图7,函数Converge()作为算法1,由多次迭代组成,直到网络模拟收敛;也就是说,如果has_update()中的所有元素为假,则网络是收敛的。在每次迭代中,算法选择一个RIB更改过的路由器,并向其对等体发出路由通知。RIB的变化指的是由于插入了一条更优的路由或撤回了最优路由而改变了路由器的最优路由。这些RIB更改存储在update_list中,这是一个具有|n|维度的全局数组,其中|n|是参与方的数量。然后,将RIB更改加载到名为updates(更新)的临时变量中。所有更新都通过ExportRoutes()来建模导出过滤器的动作,将updates转换为exports(输出)。ImportRoutes()函数对对等路由器n上的导入过滤器建模,并类似地修改exports。Referring to Figure 7, the function Converge(), as Algorithm 1, consists of multiple iterations until the network simulation converges; that is, if all elements in has_update() are false, the network is converged. In each iteration, the algorithm selects a router whose RIB has changed and sends out route advertisements to its peers. The change of RIB refers to the change of the optimal route of the router due to the insertion of a better route or withdrawal of the optimal route. These RIB changes are stored in update_list, a global array with |n| dimensions, where |n| is the number of parties. Then, load the RIB changes into a temporary variable called updates. All updates are passed through ExportRoutes() to model the action of the export filter, which converts updates into exports (output). The ImportRoutes() function models import filters on peer router n and similarly modifies exports.

参考图8,ExportRoutes()算法作为算法2,用于建模导出过滤器,如果更新的路由的类型为add(添加),首先将路由的不传递属性清空;如果AS path包含peer的AS,则不导出该路由。之后,应用export policy来看是否允许导出该路由;如果允许导出该路由,则首先加上as-path发送者的as号并设置下一跳ip。最后将该路由放入exports数组中。如果更新的路由的信息为delete(删除),update(更新)时,则直接导出。Referring to Figure 8, the ExportRoutes() algorithm is used as Algorithm 2 to model the export filter. If the type of the updated route is add (add), first clear the non-transitive attribute of the route; if the AS path contains the AS of the peer, then This route is not exported. After that, apply the export policy to see if the route is allowed to be exported; if the route is allowed to be exported, first add the as number of the as-path sender and set the next hop ip. Finally put the route into the exports array. If the updated routing information is delete (delete), update (update), it will be exported directly.

参考图9,ImportRoutes()算法作为算法3,用于建模导入过滤器。如果更新的路由的类型为add,且路由的AS path包含peer的AS,则不导入该条路由。对该条路由应用importpolicy来看是否允许导入该条路由;如果允许导入,则在peer的RIB中添加这条路由。如果更新的路由的类型为delete或update,则在peer的RIB中删除或更新这条路由。Referring to Figure 9, the ImportRoutes() algorithm, as Algorithm 3, is used to model import filters. If the type of the updated route is add and the AS path of the route contains the AS of the peer, the route will not be imported. Apply importpolicy to this route to see if the route is allowed to be imported; if import is allowed, add this route to the peer's RIB. If the type of the updated route is delete or update, delete or update this route in the RIB of the peer.

参考图10,PolicyOutAllowed算法和PolicyInAllowed算法作为算法4,用于对路由执行导入和导出策略。遍历所有的outPolicy(外部策略),看是否匹配match语句,如果匹配,则执行对应的set语句。Referring to FIG. 10 , the PolicyOutAllowed algorithm and the PolicyInAllowed algorithm are used as Algorithm 4 to implement import and export policies for routes. Traverse all outPolicy (external policies) to see if they match the match statement, and if they match, execute the corresponding set statement.

参考图11,Match算法作为算法5,用于匹配路由前缀和下一跳,。Referring to FIG. 11 , the Match algorithm is used as Algorithm 5 for matching route prefixes and next hops.

参考图12,Set算法作为算法6用于设置本地优先级和下一跳。Referring to FIG. 12 , the Set algorithm is used as Algorithm 6 to set the local priority and next hop.

参考图13和图14,UpdateRIB算法作为算法7,用于处理由于导入而导致peer的RIB中的最佳路由发生变化的情况;如果更新的路由的类型为add,则先更新路由的OriginID和RIBID,之后将新的RIB变化添加到update_list(peer),并将has_update(peer)赋值为True,并更新peer的RIB。如果更新的类型为delete和update,则对应路由的撤销和更新,首先匹配OriginID和RIBID是否相等,若匹配,则将新的RIB变化添加update_list(peer),并将has_update(peer)赋值为True,并更新peer的RIB。当路由通告被导入时,它将被插入peer的RIB的第k个位置,在它之前的所有k-1条路由都具有更高的优先级。在对RIB中的路由进行比较的过程是通过PriorityCompare算法(即算法8)来实现的,和BGP中的选路规则一致,首先比较本地优先级,之后比较AS Path的长度和MED。Referring to Figure 13 and Figure 14, the UpdateRIB algorithm is used as Algorithm 7, which is used to deal with the situation that the best route in the peer's RIB changes due to import; if the type of the updated route is add, first update the OriginID and RIBID of the route , and then add the new RIB changes to update_list(peer), assign has_update(peer) to True, and update the peer's RIB. If the update type is delete and update, corresponding to the revocation and update of the route, first match whether OriginID and RIBID are equal, if they match, add the new RIB change to update_list(peer), and assign has_update(peer) to True, And update the peer's RIB. When a route advertisement is imported, it is inserted at position k of the peer's RIB, with all k-1 routes before it having higher priority. The process of comparing the routes in the RIB is implemented through the PriorityCompare algorithm (namely, Algorithm 8), which is consistent with the route selection rules in BGP. First, the local priority is compared, and then the length of the AS Path and the MED are compared.

数据无关(data-oblivious)是一种计算方法,它要求在执行计算时,所有操作都不会泄露关于输入数据的任何信息。换句话说,数据无关算法的执行过程不会依赖于输入数据的具体值,因此不能通过观察算法的执行过程来推断输入数据的信息。Data-oblivious is a method of computation that requires that all operations be performed without revealing any information about the input data. In other words, the execution of a data-independent algorithm does not depend on the specific values of the input data, so information about the input data cannot be inferred by observing the execution of the algorithm.

数据无关算法在隐私保护和安全领域具有重要意义,特别是在安全多方计算(SMPC)和全同态加密等场景中。通过使用数据无关算法,可以在多个参与方之间执行计算,同时确保他们的输入数据不会泄露给其他参与方或第三方观察者。Data-independent algorithms are of great significance in the fields of privacy protection and security, especially in scenarios such as secure multi-party computation (SMPC) and fully homomorphic encryption. By using data-agnostic algorithms, computations can be performed across multiple parties while ensuring that their input data is not leaked to other parties or third-party observers.

数据无关方法的一个典型例子是基于安全多方计算的排序算法。在这种情况下,多个参与方可以协作对一组数进行排序,但在整个过程中,他们不能获取关于其他参与方输入数据的任何信息。通过这种方式,数据无关方法可以保护参与方的隐私,同时允许他们在不泄露关键信息的情况下进行协同计算。A typical example of a data-independent approach is a sorting algorithm based on secure multi-party computation. In this case, multiple parties can collaborate to sort a set of numbers, but during the entire process, they cannot obtain any information about the input data of other parties. In this way, the data-agnostic approach preserves the privacy of the participants while allowing them to perform collaborative computations without revealing critical information.

安全外包计算被用来激励这项工作,我们假设在保护的数据上进行计算。这意味着所有的输入和中间结果都不为执行计算的一方或多方所知。除非我们为了访问特定位置的数据而显式地打开它们的值。为了说明的具体性,我们使用符号[x]来指示x的值被保护不受执行计算的实体的影响。Securely outsourced computation is used to incentivize this work, and we assume computation is performed on protected data. This means that all inputs and intermediate results are unknown to the party or parties performing the computation. Unless we explicitly open their values in order to access the data in a specific location. For the sake of specificity of illustration, we use the notation [x] to indicate that the value of x is protected from the entity performing the computation.

为了维护数据隐私,我们必须保证计算方在算法执行期间不会了解任何有关数据的信息。因为假设每个私有值都被充分保护,所以计算方推断关于私有数据的信息的唯一方式是当指令序列或算法的存储器访问模式取决于数据时。因此,为了保证数据隐私,我们正式地将确定性算法的数据遗忘执行公式化如下:In order to maintain data privacy, we must ensure that the computing party does not learn anything about the data during the execution of the algorithm. Because it is assumed that every private value is sufficiently protected, the only way for a computing party to infer information about private data is when the sequence of instructions or the memory access pattern of an algorithm depends on the data. Therefore, to guarantee data privacy, we formally formulate the data-forgetting execution of a deterministic algorithm as follows:

定义1:令d表示算法的输入。同样,让A(d)表示算法进行的存储器访问序列。如果对于两个相等长度的输入d和d’,算法执行相同的指令序列,并且执行计算的每一方都无法区分访问模式A(d)和A(d’),则该算法被认为是数据无关的。Definition 1: Let d denote the input of the algorithm. Likewise, let A(d) denote the sequence of memory accesses made by the algorithm. An algorithm is said to be data-independent if, for two inputs d and d' of equal length, the algorithm executes the same sequence of instructions, and each party performing the computation cannot distinguish between the access patterns A(d) and A(d') of.

不失一般性,在以下描述中,我们使用算术运算来实现布尔运算。特别地,我们通过a·b来实现合取a∧b,通过(1-a)来实现布尔a的补a。Without loss of generality, in the following description we use arithmetic operations to implement Boolean operations. In particular, we realize the conjunction a∧b by a·b, and the complement a of Boolean a by (1-a).

图15为本公开示例性实施方式的数据无关算法的代码示意图。Fig. 15 is a code schematic diagram of a data-independent algorithm according to an exemplary embodiment of the present disclosure.

DO-Simulation实现了数据无关的执行模式,以防止信息泄漏。在大多数情况下,即使数据被加密,也可以记录访问模式。在这里,我们通过一个在DO-Simulation中高频使用的决定路由优先级的函数priority compare(即图15的策略1和策略2)来说明数据无关算法。根据先前的工作,该算法是数据无关的,因为程序的控制流是固定的并且是公开的,所有各方都可以步调一致地遵循它。此外,对于变量的中间计算,我们采用适合于二进制或算术电路安全计算的协议来完成。DO-Simulation implements a data-independent execution mode to prevent information leakage. In most cases, access patterns can be logged even if the data is encrypted. Here, we illustrate the data-independent algorithm through a function priority compare (i.e. strategy 1 and strategy 2 in Figure 15) that is frequently used in DO-Simulation to determine routing priority. According to previous work, the algorithm is data-independent because the control flow of the program is fixed and public, and all parties can follow it in unison. Furthermore, for intermediate calculations of variables, we do so with a protocol suitable for safe calculations in binary or arithmetic circuits.

隐私保护下的数据平面验证模块DO-DPV尝试在DO-Simulation生成的秘密数据平面上验证网络属性(例如可达性,隔离等)。作为一个原型,我们假设路由可达性等于转发可达性,并将这些属性转化为对rib的线性扫描操作。例如,为了验证A可以到达B,我们通过对B的RIB执行一个数据无关的搜索,以检查是否有一个到目的地A的有效条目。The data plane verification module DO-DPV under privacy protection tries to verify network properties (such as reachability, isolation, etc.) on the secret data plane generated by DO-Simulation. As a prototype, we assume that routing reachability is equal to forwarding reachability, and translate these properties into a linear scan operation on the rib. For example, to verify that A can reach B, we do a data-independent search of B's RIB to check if there is a valid entry to destination A.

本公开还进行了路由模拟收敛速度优化,结合了FASTPLANE的路由模拟计算加速技术,通过选择合理的路由传播模拟次序,减少不必要的路由撤销,加快收敛速度,最终提升系统性能。FASTPLANE的关键思想是首先发送全局最优路由公告。对于单调网络,FASTPLANE可以通过选择适当的传播顺序来有效地生成数据平面。然而,FASTPLANE不能应用于非单调网络中。因为在根据上述传播顺序进行模拟时会发生路由撤回,而FASTPLANE不执行撤回操作。为了支持非单调网络,我们实现了基于FASTPLANE的路由撤回操作。在我们所有数据集下的实验表明,这种设计可以通过减少路线撤回的频率来加速模拟过程。然而,这种设计可能会导致特定网络的效率下降,例如每个路由器都喜欢路径更长的路由。The disclosure also optimizes the convergence speed of routing simulation, combines FASTPLANE routing simulation calculation acceleration technology, and reduces unnecessary routing revocation by selecting a reasonable route propagation simulation sequence, speeds up convergence speed, and ultimately improves system performance. The key idea of FASTPLANE is to send the globally optimal route announcement first. For monotonic networks, FASTPLANE can efficiently generate data planes by choosing an appropriate propagation order. However, FASTPLANE cannot be applied to non-monotonic networks. Because route withdrawal occurs when simulated according to the above propagation order, and FASTPLANE does not perform the withdrawal operation. To support non-monotonic networks, we implemented a FASTPLANE-based route withdrawal operation. Experiments under all our datasets show that this design can speed up the simulation process by reducing the frequency of route withdrawals. However, this design may lead to inefficiencies in specific networks, such as each router prefers routes with longer paths.

我们进行了大量的实验来证明InCV的可行性和好处。We conduct extensive experiments to demonstrate the feasibility and benefits of InCV.

图16为本公开示例性实施方式的不同规模网络的时间开销对比图。Fig. 16 is a comparison diagram of time overheads of networks of different scales according to an exemplary embodiment of the present disclosure.

如图16所示,其横坐标为网络节点的数量(Number of Network Node),纵坐标为验证时间(Verification Time),验证时间的单位为微秒(μs)在SMPC的开销方面,InCV相较于其明文版本用时多了10^7-10^9倍,这也是复杂问题安全多方计算求解程序在性能方面的常见问题。对于32个节点的网络,明文版本的验证器可以在约10us以内完成验证,密文版本的需要约52分钟。As shown in Figure 16, the abscissa is the number of network nodes (Number of Network Node), the ordinate is the verification time (Verification Time), and the unit of the verification time is microseconds (μs). In terms of SMPC overhead, InCV compares Because the plaintext version takes 10^7-10^9 times longer, this is also a common problem in the performance of complex problem secure multi-party computation solvers. For a network of 32 nodes, the plaintext verifier can complete the verification within about 10us, and the ciphertext version takes about 52 minutes.

图17为本公开示例性实施方式的不同规模网络的通信轮次与全局数量对比图。图17(a)的横坐标为网络节点的数量(Number of Network Node),纵坐标为总的数据传输率(Global Data Sent),总的数据传输率的单位为GB。图17(b)的横坐标为网络节点的数量(Number of Network Node),纵坐标为总的通信轮次(Average Communi-cation Rounds),总的通信轮次单位为k。Fig. 17 is a comparison diagram of communication rounds and global numbers of networks of different scales according to an exemplary embodiment of the present disclosure. The abscissa in Fig. 17(a) is the number of network nodes (Number of Network Node), and the ordinate is the total data transmission rate (Global Data Sent), and the unit of the total data transmission rate is GB. The abscissa in Figure 17(b) is the number of network nodes (Number of Network Node), the ordinate is the total communication rounds (Average Communication Rounds), and the unit of the total communication rounds is k.

如图17的(a)和(b)所示,给出了InCV全局通信轮次和通信数据量随网络规模增加的变化趋势。结果表明,在域间验证中实现数据无关的SMPC在时间上是非常昂贵的,因为代理之间必须连续通信数十万次,传输的数据量达到100GB。然而在较小规模的域间网络中,我们认为其绝对耗时依然在可接受范围内。As shown in (a) and (b) of Figure 17, the change trend of InCV global communication rounds and communication data volume with the increase of network scale is given. The results show that implementing data-agnostic SMPC in inter-domain verification is very expensive in time, since the agents have to communicate hundreds of thousands of times continuously, and the amount of transferred data reaches 100GB. However, in smaller-scale inter-domain networks, we believe that the absolute time consumption is still within an acceptable range.

图18为本公开示例性实施方式的InCV与未采用FASTPLANE优化版本的对比图。其横坐标为网络节点的数量(Number of Network Node),纵坐标为验证时间(VerificationTime),验证时间的单位为秒(s)。FIG. 18 is a graph comparing InCV of an exemplary embodiment of the present disclosure with a non-FASTPLANE optimized version. The abscissa is the number of network nodes (Number of Network Node), the ordinate is the verification time (VerificationTime), and the unit of the verification time is seconds (s).

为了展示基于快速控制平面验证FASTPLANE的优化技术的效果,我们在合成网络上比较了优化前后的InCV。如图18所示,结果表明对于具有32个AS的网络,由于路由撤销次数减少和模拟迭代次数减少,实现了约19%的加速。To demonstrate the effect of optimization techniques based on fast control plane verification FASTPLANE, we compare InCV before and after optimization on synthetic networks. As shown in Figure 18, the results show that for a network with 32 ASs, about 19% speedup is achieved due to the reduced number of route withdrawals and the reduced number of simulation iterations.

本公开可为多管理域网络中互不信任的多个运营者提供网络验证需求服务,用来在保障域内配置隐私的前提下排查多管理域网络故障,以及确保多管理域网络控制平面的正确性。This disclosure can provide network verification requirements services for multiple operators who do not trust each other in a multi-management domain network, and is used to troubleshoot multi-management domain network faults under the premise of ensuring the configuration privacy in the domain, and ensure the correctness of the multi-management domain network control plane. sex.

本公开提出的多管理域网络验证方法及系统,通过结合安全多方计算相关技术,将网络验证系统的实际适用范围首次从单管理域网络拓展至多管理域网络,并能够保证各参与方数据安全。具体来说,我们设计了模拟BGP中的路由通告的DO-Simulation算法。运行DO-Simulation后,网络在收敛后会生成一个秘密数据平面(RIBs),这是下一步对不同属性进行验证的DO-DPV算法的基础。The multi-management domain network verification method and system proposed in this disclosure expands the actual scope of application of the network verification system from a single management domain network to a multi-management domain network for the first time by combining secure multi-party computing related technologies, and can ensure the data security of each participant. Specifically, we design a DO-Simulation algorithm for simulating route advertisement in BGP. After running DO-Simulation, the network generates a secret data plane (RIBs) after convergence, which is the basis of the DO-DPV algorithm for verification of different properties in the next step.

本公开提出了基于云服务的多管理域网络验证系统架构,解决了跨域间网络通信高延迟、难以保证数据面可达性等问题,降低了参与者间的通信开销。This disclosure proposes a multi-management domain network verification system architecture based on cloud services, which solves the problems of high delay in inter-domain network communication and difficulty in ensuring data plane accessibility, and reduces communication overhead between participants.

本公开结合了FASTPLANE的路由模拟计算加速技术,通过选择合理的路由传播模拟次序,减少不必要的路由撤销,加快收敛速度,最终提升系统性能。The disclosure combines FASTPLANE's route simulation calculation acceleration technology, by selecting a reasonable route propagation simulation order, reducing unnecessary route withdrawal, accelerating convergence speed, and finally improving system performance.

本公开提供的多管理域网络验证系统,还可以通过采用处理系统的硬件实现方式的装置实现。The multi-management domain network authentication system provided in the present disclosure can also be realized by a device using the hardware implementation of the processing system.

该装置可以包括执行上述流程图中各个或几个步骤的相应模块。因此,可以由相应模块执行上述流程图中的每个步骤或几个步骤,并且该装置可以包括这些模块中的一个或多个模块。模块可以是专门被配置为执行相应步骤的一个或多个硬件模块、或者由被配置为执行相应步骤的处理器来实现、或者存储在计算机可读介质内用于由处理器来实现、或者通过某种组合来实现。The device may include corresponding modules for executing each or several steps in the above flow chart. Therefore, each step or several steps in the above flowcharts may be performed by corresponding modules, and the apparatus may include one or more of these modules. A module may be one or more hardware modules specifically configured to perform the corresponding steps, or be implemented by a processor configured to perform the corresponding steps, or be stored in a computer-readable medium for implementation by the processor, or be implemented by a some combination to achieve.

该硬件结构可以利用总线架构来实现。总线架构可以包括任何数量的互连总线和桥接器,这取决于硬件的特定应用和总体设计约束。总线将包括一个或多个处理器、存储器和/或硬件模块的各种电路连接到一起。总线还可以将诸如外围设备、电压调节器、功率管理电路、外部天线等的各种其它电路连接。The hardware structure can be implemented using a bus architecture. The bus architecture can include any number of interconnecting buses and bridges, depending on the specific application of the hardware and the overall design constraints. The bus connects together various circuits including one or more processors, memory and/or hardware modules. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, external antennas, and the like.

总线可以是工业标准体系结构(ISA,Industry Standard Architecture)总线、外部设备互连(PCI,Peripheral Component)总线或扩展工业标准体系结构(EISA,ExtendedIndustry Standard Component)总线等。总线可以分为地址总线、数据总线、控制总线等。为便于表示,该图中仅用一条连接线表示,但并不表示仅有一根总线或一种类型的总线。The bus may be an Industry Standard Architecture (ISA, Industry Standard Architecture) bus, a Peripheral Component Interconnect (PCI, Peripheral Component) bus, or an Extended Industry Standard Architecture (EISA, Extended Industry Standard Component) bus, etc. The bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one connection line is used in this figure, but it does not mean that there is only one bus or one type of bus.

流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现特定逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分,并且本公开的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本公开的实施方式所属技术领域的技术人员所理解。处理器执行上文所描述的各个方法和处理。例如,本公开中的方法实施方式可以被实现为软件程序,其被有形地包含于机器可读介质,例如存储器。在一些实施方式中,软件程序的部分或者全部可以经由存储器和/或通信接口而被载入和/或安装。当软件程序加载到存储器并由处理器执行时,可以执行上文描述的方法中的一个或多个步骤。备选地,在其他实施方式中,处理器可以通过其他任何适当的方式(例如,借助于固件)而被配置为执行上述方法之一。Any process or method descriptions in flowcharts or otherwise described herein may be understood to represent modules, segments or portions of code comprising one or more executable instructions for implementing specific logical functions or steps of the process , and the scope of preferred embodiments of the present disclosure includes additional implementations in which functions may be performed out of the order shown or discussed, including substantially concurrently or in reverse order depending on the functions involved, which shall It is understood by those skilled in the art to which the embodiments of the present disclosure belong. The processor executes the various methods and processes described above. For example, method embodiments in the present disclosure may be implemented as a software program tangibly embodied on a machine-readable medium, such as memory. In some implementations, part or all of the software program may be loaded and/or installed via memory and/or a communication interface. One or more steps in the methods described above may be performed when a software program is loaded into memory and executed by a processor. Alternatively, in other implementation manners, the processor may be configured to perform one of the above-mentioned methods in any other suitable manner (for example, by means of firmware).

在流程图中表示或在此以其他方式描述的逻辑和/或步骤,可以具体实现在任何可读存储介质中,以供指令执行系统、装置或设备(如基于计算机的系统、包括处理器的系统或其他可以从指令执行系统、装置或设备取指令并执行指令的系统)使用,或结合这些指令执行系统、装置或设备而使用。The logic and/or steps shown in the flowcharts or otherwise described herein can be embodied in any readable storage medium for instruction execution systems, devices or devices (such as computer-based systems, processor-included system or other systems that may fetch and execute instructions from an instruction execution system, device, or device), or be used in conjunction with such an instruction execution system, device, or device.

就本说明书而言,“可读存储介质”可以是任何可以包含、存储、通信、传播或传输程序以供指令执行系统、装置或设备或结合这些指令执行系统、装置或设备而使用的装置。可读存储介质的更具体的示例(非穷尽性列表)包括以下:具有一个或多个布线的电连接部(电子装置),便携式计算机盘盒(磁装置),随机存取存储器(RAM),只读存储器(ROM),可擦除可编辑只读存储器(EPROM或闪速存储器),光纤装置,以及便携式只读存储器(CDROM)。另外,可读存储介质甚至可以是可在其上打印程序的纸或其他合适的介质,因为可以例如通过对纸或其他介质进行光学扫描,接着进行编辑、解译或必要时以其他合适方式进行处理来以电子方式获得程序,然后将其存储在存储器中。As far as this specification is concerned, a "readable storage medium" may be any device that can contain, store, communicate, spread or transmit programs for instruction execution systems, devices or devices or use in conjunction with these instruction execution systems, devices or devices. More specific examples (non-exhaustive list) of readable storage media include the following: electrical connection with one or more wires (electronic device), portable computer disk case (magnetic device), random access memory (RAM), Read Only Memory (ROM), Erasable and Editable Read Only Memory (EPROM or Flash Memory), Fiber Optic Devices, and Portable Read Only Memory (CDROM). In addition, the readable storage medium may even be paper or other suitable medium on which the program can be printed, since the program can be scanned, for example, by optical scanning of the paper or other medium, followed by editing, interpretation or other suitable means if necessary. processing to obtain programs electronically and store them in memory.

应当理解,本公开的各部分可以用硬件、软件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件来实现。例如,如果用硬件来实现,和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或他们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。It should be understood that various parts of the present disclosure may be realized by hardware, software or a combination thereof. In the embodiments described above, various steps or methods may be implemented by software stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques known in the art: Discrete logic circuits, ASICs with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.

本技术领域的普通技术人员可以理解实现上述实施方式方法的全部或部分步骤是可以通过程序来指令相关的硬件完成,的程序可以存储于一种可读存储介质中,该程序在执行时,包括方法实施方式的步骤之一或其组合。Those of ordinary skill in the art can understand that all or part of the steps to realize the above-mentioned implementation method can be completed by instructing related hardware through a program, and the program can be stored in a readable storage medium. When the program is executed, it includes One or a combination of steps of a method embodiment.

此外,在本公开各个实施方式中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个可读存储介质中。存储介质可以是只读存储器,磁盘或光盘等。In addition, each functional unit in each embodiment of the present disclosure may be integrated into one processing module, each unit may exist separately physically, or two or more units may be integrated into one module. The above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules. If the integrated modules are realized in the form of software function modules and sold or used as independent products, they can also be stored in a readable storage medium. The storage medium may be a read-only memory, a magnetic disk or an optical disk, and the like.

本领域的技术人员应当理解,上述实施方式仅仅是为了清楚地说明本公开,而并非是对本公开的范围进行限定。对于所属领域的技术人员而言,在上述公开的基础上还可以做出其它变化或变型,并且这些变化或变型仍处于本公开的范围内。It should be understood by those skilled in the art that the above-mentioned embodiments are only for clearly illustrating the present disclosure, rather than limiting the scope of the present disclosure. For those skilled in the art, other changes or modifications can be made on the basis of the above disclosure, and these changes or modifications are still within the scope of the present disclosure.

Claims (10)

1. A method for verifying a multi-management-domain network, comprising:
converting router configuration files of all application servers into an input format determined by a secure multiparty computing protocol so as to ensure compatibility among all the application servers;
performing simulation processing on the router configuration file meeting the input format so as to enable the multi-management-domain network to generate a secret data plane after convergence; and
and carrying out data plane verification on the secret data plane to obtain verification results of various attributes of the multi-management-domain network.
2. The method of claim 1, wherein translating the router configuration file of each application server into the input format determined by the secure multiparty computing protocol, comprises:
Converting the router configuration file of each application server into the same intermediate representation;
and converting the intermediate representation into an input format determined by the secure multiparty computing protocol.
3. The method of claim 2, wherein the input format determined by the secure multi-party computing protocol comprises: inter-domain routing information table, router configuration information of the application server, router node update status and routing information update list of the application server, wherein
The inter-domain route information table is at least used for storing route data, wherein the route data at least comprises a prefix of a route announcement, a network protocol address of a next router node, other router nodes which pass through, the current local priority of the router node and changed router information; and
the router configuration information of the application server is used for representing the relation between the current router node and the adjacent router node, wherein the router configuration information at least comprises a network protocol address of the adjacent router node, the current application server number of the router node, the application server number of the adjacent router node, the current interface network protocol address corresponding to the router node and the current input/output strategy corresponding to the router node.
4. The method according to claim 1, wherein the simulating the router configuration file satisfying the input format so that the multi-domain network generates a secret data plane after convergence, comprises:
initializing an inter-domain routing information table of router nodes in each application server, so that only original router nodes are stored in each inter-domain routing information table;
responding to the update information of any inter-domain routing information table, and sending a routing notification to a peer router node of the router node corresponding to the update information; and
and controlling each router node to execute the corresponding route advertisement until the multi-management-domain network converges and the secret data plane is generated.
5. The method according to claim 4, wherein the sending, in response to update information of any one of the inter-domain routing information tables, a routing notification to a peer router node of the router node corresponding to the update information, includes at least:
modeling the action of the export filter of the router node with an export route function to convert the updated information into export data; and
The ingress filter on the peer router node is modeled with an ingress route function and the egress data is modified.
6. The multi-domain network authentication method according to claim 1, wherein said performing data plane authentication on the secret data plane to obtain authentication results regarding respective attributes of the multi-domain network comprises:
controlling a destination router node to execute data irrelevant search operation, and judging whether a path reaching an entry router node exists in an effective path corresponding to the destination router node; and
in response to there being a path to the ingress router node, determining that the ingress router node meets reachability to the destination router node to obtain a verification result regarding reachability attributes of the multi-domain network.
7. The multiple administrative domain network verification method according to claim 1, further comprising:
and encrypting the private value of each application server to prevent the private value from being read when the secret data plane is subjected to data plane verification.
8. The multi-domain network authentication method according to claim 1, characterized by comprising, after said performing data plane authentication on said secret data plane to obtain authentication results on respective attributes of said multi-domain network:
And synchronizing the verification result to each application server so that each application server obtains the attribute satisfied by the multi-management-domain network.
9. The method of claim 1, comprising, prior to said translating router configuration files for each application server into an input format determined by a secure multiparty computing protocol to ensure compatibility between each of said application servers:
and connecting and authenticating the router nodes of the application servers with the proxy server, and sending the router configuration information of the router nodes to the proxy server.
10. A multiple management domain network authentication system, comprising:
the configuration analysis module is used for converting the router configuration file of each application server into an input format determined by a secure multiparty computing protocol so as to ensure compatibility among the application servers;
the routing protocol simulation module is used for performing simulation processing on the router configuration file meeting the input format so as to enable the multi-management-domain network to generate a secret data plane after convergence; and
And the data plane verification module is used for carrying out data plane verification on the secret data plane so as to obtain verification results of various attributes of the multi-management-domain network.
CN202310710233.XA 2023-06-15 2023-06-15 Multi-management domain network verification method and system Pending CN116684247A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310710233.XA CN116684247A (en) 2023-06-15 2023-06-15 Multi-management domain network verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310710233.XA CN116684247A (en) 2023-06-15 2023-06-15 Multi-management domain network verification method and system

Publications (1)

Publication Number Publication Date
CN116684247A true CN116684247A (en) 2023-09-01

Family

ID=87790666

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310710233.XA Pending CN116684247A (en) 2023-06-15 2023-06-15 Multi-management domain network verification method and system

Country Status (1)

Country Link
CN (1) CN116684247A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3542300A1 (en) * 2016-11-15 2019-09-25 Innogy Innovation GmbH Method for operating a peer-to-peer application
CN112054921A (en) * 2020-08-06 2020-12-08 清华大学 Network verification method and device, computer storage medium and electronic equipment
CN115051984A (en) * 2021-11-22 2022-09-13 厦门大学 Distributed data plane verification method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3542300A1 (en) * 2016-11-15 2019-09-25 Innogy Innovation GmbH Method for operating a peer-to-peer application
CN112054921A (en) * 2020-08-06 2020-12-08 清华大学 Network verification method and device, computer storage medium and electronic equipment
CN115051984A (en) * 2021-11-22 2022-09-13 厦门大学 Distributed data plane verification method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
方星 等: "网络验证研究综述", 《软件学报》, no. 2023, 15 November 2022 (2022-11-15), pages 351 - 380 *

Similar Documents

Publication Publication Date Title
Lu et al. DRRS-BC: Decentralized routing registration system based on blockchain
Oorschot et al. On interdomain routing security and pretty secure BGP (psBGP)
US20200213215A1 (en) Access device blockchain network systems and methods
Chen et al. SDN-based privacy preserving cross domain routing
CN109698791B (en) Anonymous access method based on dynamic path
Huszti et al. Scalable, password-based and threshold authentication for smart homes
CN116601928A (en) Method and system for distributed network authentication
Klenze et al. Formal verification of secure forwarding protocols
Gurney et al. Having your cake and eating it too: Routing security with privacy protections
CN112020849A (en) Method for verifying a node
Schneider et al. On the complexity of network-wide configuration synthesis
CN110311828A (en) Method, device, computer storage medium and electronic equipment for network verification
Meier et al. Portable trust anchor for OPC UA using auto-configuration
CN116684247A (en) Multi-management domain network verification method and system
Shao et al. Accelerating bgp configuration verification through reducing cycles in smt constraints
CN117081734A (en) Cross-domain authentication method for trusted access of industrial Internet equipment
Su et al. Research on blockchain-based inter-domain routing authentication technology
Zhang et al. Secure inter-domain forwarding loop test in software defined networks
Diekmann et al. Certifying spoofing-protection of firewalls
Kumar Model driven security analysis of IDaaS protocols
Tsumak Securing BGP using blockchain technology
Shinde et al. Analysis of Cryptographic Protocols AKI, ARPKI and OPT using ProVerif and AVISPA
Gawanmeh et al. Novel algorithm for detecting conflicts in firewall rules
Zhang et al. HC-BGP: A light-weight and flexible scheme for securing prefix ownership
Zhang et al. A Trusted Remote Data Trading Scheme in Hybrid SDN for Intelligent Internet of Things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination